Bitcoin Exchange Mt. Gox Goes Offline Amid Allegations of $350 Million Hack

A coalition of bitcoin businesses — including bitcoin wallet-makers Coinbase and Blockchain — quickly put out a statement as news of the hack spread. “This tragic violation of the trust of users of Mt. Gox was the result of one company’s abhorrent actions and does not reflect the resilience or value of bitcoin and the digital currency industry,” they said. “There are hundreds of trustworthy and responsible companies involved in bitcoin.”

via Bitcoin Exchange Mt. Gox Goes Offline Amid Allegations of $350 Million Hack | Wired Enterprise | Wired.com.

World’s largest DDoS strikes US, Europe

The Network Time Protocol (NTP) Reflection attack exploits a timing mechanism that underpins a way the internet works to greatly amplify the power of what would otherwise be a small and ineffective assault.

via World’s largest DDoS strikes US, Europe – Security – Technology – News – iTnews.com.au.

The OpenNTPProject can help administrators determine if their servers are vulnerable.

Hearings on community broadband services bill postponed

Senate Bill 304 would prohibit cities and counties from building public broadband networks. The Commerce Committee, which Lynn chairs, was scheduled to have a hearing Tuesday, but Lynn released a statement that hearings have been postponed indefinitely.

via Hearings on community broadband services bill postponed | Wichita Eagle.

The Biggest Battle in All Of EVE

Once the TCU onlining was decided, the fight just became about carnage: who could kill the most the fastest. The fleets committed by both sides represent a staggering amount of time, effort, and ISK. Each titan costs about 100 billion ISK (up to 160 or even 220b for particularly expensive fits), which can be purchased for about $3,000 USD by buying game time and selling it to other players for ISK. More than that, though, to build a titan requires several weeks and a nice quiet undisturbed area of space, something harder to find in the current climate. Supercarriers are similarly challenging. Dreadnaughts and carriers, while not as difficult to build, still represent a significant investment of effort on the part of an industrialist somewhere.

via B-R5RB: The Biggest Battle in All Of EVE | TheMittani.com.

Burden of proof of infringement on patent holder

The Supreme Court on Wednesday upheld the decision of the district court, stating that it holds that “when a licensee seeks a declaratory judgment against a patentee to establish that there is no infringement, the burden of proving infringement remains with the patentee.”

via US Supreme Court: Burden of proof of infringement on patent holder | ITworld.

A First Look at the Target Intrusion, Malware

Target has yet to honor a single request for comment from this publication, and the company has said nothing publicly about how this breach occurred. But according to sources, the attackers broke in to Target after compromising a company Web server. Somehow, the attackers were able to upload the malicious POS software to store point-of-sale machines, and then set up a control server within Target’s internal network that served as a central repository for data hoovered by all of the infected point-of-sale devices.

via A First Look at the Target Intrusion, Malware — Krebs on Security.

FAA Selects Six Sites for Unmanned Aircraft Research

In selecting the six test site operators, the FAA considered geography, climate, location of ground infrastructure, research needs, airspace use, safety, aviation experience and risk. In totality, these six test applications achieve cross-country geographic and climatic diversity and help the FAA meet its UAS research needs.

via FAA Selects Six Sites for Unmanned Aircraft Research.

Catalog Reveals NSA Has Back Doors for Numerous Devices

There is no information in the documents seen by SPIEGEL to suggest that the companies whose products are mentioned in the catalog provided any support to the NSA or even had any knowledge of the intelligence solutions. “Cisco does not work with any government to modify our equipment, nor to implement any so-called security ‘back doors’ in our products,” the company said in a statement. Contacted by SPIEGEL reporters, officials at Western Digital, Juniper Networks and Huawei also said they had no knowledge of any such modifications. Meanwhile, Dell officials said the company “respects and complies with the laws of all countries in which it operates.”

via Catalog Reveals NSA Has Back Doors for Numerous Devices – SPIEGEL ONLINE.

Cooperation such that telecom equipment providers provide in support of CALEA would be needed for this to work.